Imbalance in spatiotemporal analysis of narcotics-related activities: a bibliometric review
Humanities and Social Sciences Communications,
Journal Year:
2025,
Volume and Issue:
12(1)
Published: Feb. 15, 2025
Language: Английский
Cybercrime through the public lens: a longitudinal analysis
Humanities and Social Sciences Communications,
Journal Year:
2025,
Volume and Issue:
12(1)
Published: March 1, 2025
Language: Английский
Weaponization of the Growing Cybercrimes inside the Dark Net: The Question of Detection and Application
Big Data and Cognitive Computing,
Journal Year:
2024,
Volume and Issue:
8(8), P. 91 - 91
Published: Aug. 14, 2024
The
Dark
Web
is
a
subset
of
the
Deep
Web,
requiring
special
browsers,
Net
refers
to
encrypted
networks,
encompasses
non-indexed
online
content,
and
darknet
includes
unused
IP
address
networks.
has
become
hotbed
cybercrime,
with
individuals
groups
using
anonymity
encryption
provided
by
network
carry
out
range
criminal
activities.
One
most
concerning
trends
in
recent
years
been
weaponization
cybercrimes,
as
criminals
use
their
technical
skills
create
tools
techniques
that
can
be
used
launch
attacks
against
individuals,
businesses,
governments.
This
paper
examines
cybercrimes
on
Net,
focusing
question
detection
application.
uses
Systematic
Literature
Review
(SLR)
method
appraise
examine
crimes
consequences
identify
future
measures
reduce
crime
threats.
Data
from
88
relevant
articles
2011
2023
were
extracted
synthesized,
along
latest
data
2024
answer
research
questions,
providing
comprehensive
knowledge
growing
crimes;
assessing
social,
economic,
ethical
impacts;
analyzing
established
methods
locate
apprehend
criminals.
Language: Английский
Understanding the Nature of the Transnational Scam-Related Fraud: Challenges and Solutions from Vietnam’s Perspective
Laws,
Journal Year:
2024,
Volume and Issue:
13(6), P. 70 - 70
Published: Nov. 21, 2024
Practical
challenges
and
special
threats
from
scam-related
fraud
exist
for
regional
local
communities
in
Southeast
Asia
during
after
the
COVID-19
pandemic.
The
rise
pig-butchering
operations
is
a
major
concern
due
to
increased
use
of
digital
technology
online
financial
transactions.
Many
these
are
linked
organized
crime
syndicates
operating
across
borders,
posing
law
enforcement.
As
first
study
Vietnam,
we
combined
primary
secondary
databases
unveil
nature
transnational
fraud.
Findings
show
that
scammers
using
advanced
methods
such
as
phishing,
fraudulent
investments,
identity
theft
maximize
their
sophisticated
tactics
achieving
possession.
There
rings
Vietnam
Cambodia,
with
Chinese
groups
playing
leading
role
behind
scenes.
Social
media
its
various
applications
have
become
common
platforms
criminal
activities.
This
also
calls
practical
recommendations
consider
specific
combating
crimes,
including
building
strong
framework
clear
policies,
encouraging
multiple
educational
awareness
campaigns
communities,
enhancing
effective
cooperation
among
enforcement
others,
supporting
evidence-based
approaches
research
application.
While
recognized
assumed
complex
problem
requires
well-rounded
coordinated
response,
exact
approach
would
depend
on
each
country’s
circumstances.
Language: Английский
Darknet Traffic Classification Using Machine Learning
Phenphitcha Pookpun,
No information about this author
Somkiat Kosolsombat,
No information about this author
Taweewat Luangwiriya
No information about this author
et al.
Published: March 29, 2024
The
Darknet
is
an
overlay
network
that
difficult
to
access.
It
requires
special
software
prevent
tracking
by
Internet
Service
Providers
(ISP)
and
malicious
actors.
often
associated
with
illegal
activities.
Therefore,
a
study
was
conducted
on
classifying
Traffic
using
Machine
Learning
detect
user
behaviors
identify
potentially
harmful
CIC-Darknet2020
dataset
utilized,
comprising
8
classes
of
behavior.
Browsing,
Chat,
Email,
File-Transfer,
P2P,
Audio,
Video,
VoIP.
Due
the
dataset's
imbalance,
SMOTE
ADASYN
techniques
were
employed.
After
applying
Learning,
it
observed
Random
Forest
achieved
highest
accuracy
in
all
experiments,
reaching
up
93.1%.
Language: Английский
Investigation of Ensemble Learning Approach for Early Detection of Traffic from Tor Browser
Ankita Kumari,
No information about this author
Ishu Sharma
No information about this author
Published: Nov. 16, 2023
In
this
research
paper,
ensemble
learning
is
used
to
create
a
new
paradigm
for
network
security.
This
study's
main
goal
detect
and
prevent
malicious
communication
from
entering
setups,
in
the
campus
area
The
dark
web,
often
known
as
"dark
net,"
an
encrypted
portion
of
internet
that
cannot
be
accessed
without
specific
permission
or
settings
not
included
search
engine
results.
People
need
privacy
do
soon
web
totally
lawful
reasons,
despite
fact
it
depicted
space
utilized
by
criminal
groups,
such
transmission
secret
company
information
political
activists.
order
secure
user
identity
ensure
anonymity,
net
encryption
technology
transmits
users'
data
via
huge
number
intermediary
servers.
Tor
Browser
browser
created
with
increasing
online
anonymity.
It
based
on
network,
decentralized
system
volunteer-run
servers
routes
infrastructure
across
several
nodes
obfuscate
user's
IP
address
make
challenging
monitor
their
activity.
may
provide
full
security
against
all
dangers.
study
enhances
safety
application
advanced
machine
learning.
Through
detection
possible
flaws
trend
analysis
use,
aims
improve
Several
different
methods
are
combined
assess
intricate
traffic
patterns.
With
ability
quickly
identify
deviations
standard,
computer
can
fake
facilitate
proactive
intervention.
great
degree
precision
demonstrated
its
efficacy.
techniques
might
employed
protect
open
networks
attacks
improved
study.
Language: Английский